Author of the publication

Achieving Lightweight and Secure Access Control in Multi-authority Cloud.

, , , , and . TrustCom/BigDataSE/ISPA (1), page 459-466. IEEE, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks., , , , and . GLOBECOM, page 1-6. IEEE, (2017)RPS: range-based path selection method for concurrent multipath transfer., , , , and . IWCMC, page 944-948. ACM, (2010)Chaotic modulations for digital underwater acoustic communications., , , and . WUWNet, page 10:1-10:2. ACM, (2013)Monitoring-based Differential Privacy Mechanism Against Query-Flooding Parameter Duplication Attack., , , , , and . CoRR, (2020)Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption., , , , and . IEEE Trans. Inf. Forensics Secur., 8 (3): 553-562 (2013)Research on Similarity Record Detection of Device Status Information Based on Multiple Encoding Field., , , , and . SpaCCS Workshops, volume 10658 of Lecture Notes in Computer Science, page 54-63. Springer, (2017)An improved attack on clock-controlled shift registers based on hardware implementation., , , and . Sci. China Inf. Sci., 56 (11): 1-10 (2013)PNT Sketch: A Generic Sketch Algorithm for Periodic Network Telemetry., , , , , and . IFIP Networking, page 1-9. IEEE, (2022)Efficiently Managing Large-Scale Keys in HDFS., , , , and . HPCC/DSS/SmartCity/DependSys, page 353-360. IEEE, (2021)Discovering obscure looking glass sites on the web to facilitate internet measurement research., , , , , , and . CoNEXT, page 426-439. ACM, (2021)